Chapter 11. Maintaining Access

In the previous chapter we talked about escalating the privilege to access the target machine. This chapter will conclude the penetration testing process by leaving the target machines open to get back access at any time.

In this chapter, we will discuss the following topics:

  • Protocol tunneling tools
  • Proxy tools
  • End-to-end connection tools

The main purpose of these tools is to help us maintain access, bypass the filters deployed on the target machine, or allow us to create a covert connection between our machine and the target. By maintaining this access, we don't need to do the whole penetration testing process again if we want to get back to the target machine at anytime.

Let's see several of the tools for maintaining ...

Get BackTrack 4: Assuring Security by Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.